Research

The Center for Cryptographic Research advances fundamental and applied work in modern cryptography, coding theory, and quantum information. Our research spans theoretical foundations, post-quantum security, and practical cryptographic systems, bringing together faculty and students from mathematics, computer science, and related disciplines.

Post-Quantum Cryptography

Post-Quantum Cryptography

Post-quantum cryptography studies cryptographic systems that remain secure in the presence of quantum adversaries. Research at the center explores lattice-based cryptography, code-based cryptography, and other constructions designed to provide strong security guarantees against quantum attacks.

Topics include:

  • Lattice-based cryptography
  • Code-based cryptography
  • Isogeny-based cryptography
  • Cryptographic hardness assumptions
Coding Theory

Coding Theory

Coding theory studies the structure and properties of error-correcting codes. Research at the center investigates both theoretical and computational aspects of codes, including their applications to cryptography and secure communication.

Topics include:

  • Error-correcting codes
  • Algebraic coding theory
  • Code equivalence problems
  • Cryptographic applications of codes
Quantum Information

Quantum Information

Quantum information science studies the use of quantum mechanical systems for computation, communication, and cryptography. Research at the Center for Cryptographic Research explores the algorithmic and theoretical foundations of quantum computation and their implications for information security.

Topics include:

  • Quantum algorithms and complexity
  • Quantum cryptography
  • Quantum information theory
  • Quantum field theory
Applied Cryptography

Applied Cryptography

Applied cryptography focuses on designing and analyzing cryptographic systems used in real-world applications. This includes protocols for secure communication, authentication, privacy protection, and distributed systems.

Topics include:

  • Secure communication protocols
  • Cryptographic implementations
  • Privacy-enhancing technologies
  • Blockchain and distributed systems